2020 IEEE 18th International Conference on Embedded and Ubiquitous Computing (EUC)最新文献

筛选
英文 中文
Trusted Video Streams in Camera Sensor Networks 摄像机传感器网络中的可信视频流
2020 IEEE 18th International Conference on Embedded and Ubiquitous Computing (EUC) Pub Date : 2020-12-01 DOI: 10.1109/EUC50751.2020.00010
Sven-Jannik Wöhnert, Kai Hendrik Wöhnert, Eldar Almamedov, V. Skwarek
{"title":"Trusted Video Streams in Camera Sensor Networks","authors":"Sven-Jannik Wöhnert, Kai Hendrik Wöhnert, Eldar Almamedov, V. Skwarek","doi":"10.1109/EUC50751.2020.00010","DOIUrl":"https://doi.org/10.1109/EUC50751.2020.00010","url":null,"abstract":"Proof of integrity in produced video data by surveillance cameras requires active forensic methods such as signatures, otherwise authenticity and integrity can be comprised and data becomes unusable e. g. for legal evidence. But a simple file- or stream-signature loses its validity when the stream is cut in parts or by separating data and signature. Using the principles of security in distributed systems similar to those of blockchain and distributed ledger technologies (BC/DLT), a chain which consists of the frames of a video which frame hash values will be distributed among a camera sensor network is presented. The backbone of this Framechain within the camera sensor network will be a camera identity concept to ensure accountability, integrity and authenticity according to the extended CIA triad security concept. Modularity by secure sequences, autarky in proof and robustness against natural modulation of data are the key parameters of this new approach. It allows the standalone data and even parts of it to be used as hard evidence.","PeriodicalId":331605,"journal":{"name":"2020 IEEE 18th International Conference on Embedded and Ubiquitous Computing (EUC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133538622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient Difference Analysis Algorithm for Runtime Requirement Degradation under System Functional Fault 系统功能故障下运行时需求退化的高效差分分析算法
2020 IEEE 18th International Conference on Embedded and Ubiquitous Computing (EUC) Pub Date : 2020-12-01 DOI: 10.1109/EUC50751.2020.00012
Jialong Li, Kazuya Aizawa, K. Tei, S. Honiden
{"title":"Efficient Difference Analysis Algorithm for Runtime Requirement Degradation under System Functional Fault","authors":"Jialong Li, Kazuya Aizawa, K. Tei, S. Honiden","doi":"10.1109/EUC50751.2020.00012","DOIUrl":"https://doi.org/10.1109/EUC50751.2020.00012","url":null,"abstract":"In event-based systems, safety properties are critical requirements to prevent the system from bad things happen. However, safety properties may be violated because of the runtime system functional fault. From the viewpoint of a self-adaptive system, such a system should be requirement-aware and changes its behavior to satisfy the designed requirements as much as possible. The previous work proposed a method to analyze possible adaptation options with degrading different requirements. Here, we propose an efficient difference analysis algorithm to shorten the analysis time so that the adaptation to functional fault can be more timely. Our idea is to reuse the analysis result of development time and re-analyze the changed part only, instead of performing the complete analysis from scratch. We evaluated our algorithm’s efficiency based on three case studies: a coalmine pump-control system, a cyber-physical security people-flow restriction system, and a factory production cell system. The experiment results indicate that our algorithm averagely reduces 75.9% of analysis time compared with the existing analysis technique.","PeriodicalId":331605,"journal":{"name":"2020 IEEE 18th International Conference on Embedded and Ubiquitous Computing (EUC)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123171848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信